Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
To transfer video streams with the application level QoS (Quality of Service) guarantees on the end-to-end transfer delay and the video quality, the coding algorithm and parameter...
MAGEST is a database for newly identified maternal cDNAs of the ascidian, Halocynthia roretzi, which aims to examine the population of the mRNAs. We have collected 3 and 5 tag seq...
There has been a rapid technical progress in three-dimensional (3D) computer graphics. But gathering surface and texture data is yet a laborious task. This paper addresses the pro...
Public-key cryptographic systems often involve raising elements of some group (e.g. GF(2n), Z/NZ, or elliptic curves) to large powers. An important question is how fast this expon...